Sciweavers

1231 search results - page 220 / 247
» A Model Transformation Approach for Design Pattern Evolution...
Sort
View
106
Voted
MINENET
2006
ACM
15 years 3 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
DAC
2000
ACM
15 years 10 months ago
On switch factor based analysis of coupled RC interconnects
We revisit a basic element of modern signal integrity analysis, the modeling of worst-case coupling capacitance effects within a switch factor (SF) based methodology. We show that...
Andrew B. Kahng, Sudhakar Muddu, Egino Sarto
OPODIS
2004
14 years 10 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
66
Voted
ICTAI
2007
IEEE
15 years 3 months ago
Curve Clustering with Spatial Constraints for Analysis of Spatiotemporal Data
In this paper we present a new approach for curve clustering designed for analysis of spatiotemporal data. Such kind of data contains both spatial and temporal patterns that we de...
Konstantinos Blekas, Christophoros Nikou, Nikolas ...
IACR
2011
110views more  IACR 2011»
13 years 9 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky